1/67
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Supervisor Password
A password required to change BIOS/UEFI Setup
User Password
A password required to use the system or view BIOS/UEFI setup.
Drive Lock Password
A Password required to access the hard drive.
Windows Hello
A feature that allows a user to sign into Windows with their face, fingerprint, or PIN.
Windows Encrypted File System (EFS)
Encrypts files and folders stored on drive using NTFS and professional versions of Windows.
Bitlocker To Go
Encrypts software on a USB Flashdrive.
Computer Authentication
An authentication method that uses a chip called the TPM, and holds the bitlocker encryption key.
User Authentication
A type of encryption that allows the startup key to be stored on a USB drive.
Guests Group
A built-in user group that has limited privileges and is given a temporary profile that is deleted when the user logs off.
Power Users Group
A type of built-in user group that is on older Windows Systems. grants group members temporary access to some administrator privileges.
Authenticated Users Group
A group that includes all user accounts except the Guest account.
Everyone Group
Includes the Authenticated Users group as well as the Guest group.
Anonymous Users
Users who haven’t been authenticated on a remote computer.
Workgroup Sharing
A strategy for sharing folders in Windows, offers better security than a homegroup.
Domain Controlling
A strategy for sharing folders in Windows, If the computer belongs to the domain, all security is managed by the network admin for the entire network.
Share permissions
Grant permissions to only network users and not local users.
NTFS Permissions
Apply to Local Users and Network Users.
gpresult command
Pulls a list of all the groups a user belongs to.
Mapped Drive
Also known as a network drive, Is a drive hosted on another computer that is given a local drive letter (ex: Z:).
Administrative Shares
Folders that are shared by default that admin accounts at the domain level can access.
What are the two types of administrative shares?
%systemroot% folder
any volume or drive
Active Directory (AD)
A suite of services and databases provided by Windows Server.
Organizational Unit (OU)
Created to make it easier for technicians to assign privileges to users and computers.
Group Policy Objects (GPO)
A feature in Active Directory that allows administrators to manage settings and configurations for users and computers within a domain.
Logon Time Restrictions
Set time restrictions in order to perform routine maintainence.
Timeout and Screen Lock
Limit how long a session remains disconnected before it ends.
Home Folder
AD is able to change this Home folder location to a share on the network (called folder redirection).
What is the order in which policies are applied?
Local
Site
Domain
OU
Enforced
When setting up OUs in a new domain, why might it be useful to put all computers in one OU and all users in another?
Policies generally apply to either users or computers.
An app that cost you $4.99 is missing from your Android. What is the best way to restore the missing app?
Go to the Play Store where you bought the app and install it again.
Restrict Failed Login Attempts
Specifies that the data on the device will be deleted after a certain amount of failed login attempts, or block further attempts.
Full Device Encryption
Encrypts all data stored on the device.
Rooting
The process of obtaining root access to an android device.
Jailbreaking
The process of obtaining root access on an iOS device.
Bring Your Own Device (BYOD)
Allow an employee or student to connect their own device to a corporate network.
Security Profiles
A set of policies and procedures to restrict how a user can access, create, and edit the organization’s resources.
Android apps are contained in an Android package kit, which has what file extension?
.apk
Hash
A value generated by applying a specific algorithm to a file or text string.
MD5 Hashing Algorithm
Produces a 128-bit hash value.
SHA-2 Hashing Algorithm
Produces a 224-, 256-, 384-, 512-bit hash value.
Virtual Private Network (VPN)
Used by telecommuting employees to connect to a corporate network by way of the internet. Data is encrypted using a technique called Tunneling.
What ways can a VPN be managed?
Operating systems, routers, or third-party software.
Wireless Wide Area Network (WWAN)
Requires a contract with a cellular carrier and a USB broadband device and a SIM Card.
What are some wireless communication protocols that are used by IoT Devices?
Wi-Fi
Zigbee
Bluetooth
Z-Wave
Router
A device that manages traffic between two or more networks.
Port Forwarding
When a firewall receives a request for communication from the Internet to a specific computer and port, the request will be allowed and forwarded to that computer.
Demilitarized Zone (DMZ)
A computer or network that is not protected by a firewall or has limited protection.
Screened Subnet
A variation of a DMZ, and the two terms are often interchangable.
Blacklists
A list of things that cannot be accessed.
Whitelist
A list of things that can be accessed.
Service Set Identifier (SSID)
The name of the wireless network.
How many WLAN Channels are available in the US?
11
Remote Desktop Connection (RDC)
Gives a user access to a Windows Desktop from anywhere on the Internet.
Microsoft Remote Assistance (MRSA)
A user on the server computer can remain signed in during the remote session, retains control of the session, and can see the screen.
Virtual Networking Computing (VNC)
A client/server software used to remotely control a computer, transfer files, and screen sharing.
Secure Shell (SSH)
An Open-source software used to remotely sign in to and control another computer.
What port does SSH use?
22
Remote Monitoring and Management (RMM) Software
Installed on systems to monitor and manage systems remotely so IT personnel can support these systems.
Ping command
Tests connectivity by sending an echo request to a remote computer.
hostname command
Displays the hostname of a computer.
ipconfig command
Can display network configuration information and refresh the TCP/IP assignments for a connection.
nslookup command
Used to test name resolution problems with DNS servers.
Reverse Lookup
Allows you to use nslookup to find the host name when you know the IP Address.
tracert command
Can be useful when trying to resolve a problem reaching a destination host.
pathping command
Combines the ping and tracert commands into a single command to help identify where on the network path the network might be slow.
net use command
Connects or disconnects a computer from a shared resource.
net user command
A command that manages user accounts.
netstat command
Gives statistics about network activity and includes several parameters.